DownUnderCTF : write-up

Raj Upadhyay
3 min readSep 20, 2020

--

Recently I participated in DownUnderCTF. I really enjoyed this CTF.

So here is how I solved some of the challenges.

1. Leggos

leggos

So first I opened the given URL.

error msg

When I tried to view the page source I encountered an error that we can show in the above image.

So next thing I did was to send a CURL request.

curl request

So we can see one javascript file. “disableMouseRightClick.js”

So I thought let me check this js file.

flag

Yaaaaas, we got our first FLAG.

Flag: DUCTF{n0_k37chup_ju57_54uc3_r4w_54uc3_9873984579843}

Twitter

twitter

So on the CTF website’s home page, we can found their twitter handle.

twitter page

Yas, we found the tweet which contains a flag but it looks like it’s encoded.

So at first look I know it’s base64 so I decode it online.

flag

YAAAAAS, we got 2nd flag.

Flag: DUCTF{https://www.youtube.com/watch?v=XfR9iY5y94s}

Welcome!

So once we connect via ssh we see a screen something like this,

welcome

After looking in the screen for a few times I got a flag.

Flag : DUCTF{w3lc0m3_t0_DUCTF_h4v3_fun!}

16 Home Runs

As we see, we have been given one string. and by looking it we can say it’s a simple base64 encoded string so I decode it online.

flag

Flag : DUCTF{16_h0m3_run5_m34n5_runn1n6_p457_64_b4535}

In a pickle

In a pickle

So when we download this “data” file and opened it in a simple text editor we can see it’s some kind of text data.

as a challenge name suggest “pickle” it’s a pickle file so I used python’s pickle module to solve it.

So it’s giving us some numbers, so collected all numbers and convert it in character via python code.

Yeeeeeeeeeees, we found the flag.

Flag: DUCTF{p1ckl3_y0uR_m3554g3}

Pretty Good Pitfall

So this was a new challenge for me.

So did some google search for .gpg file. and I found that in kali Linux we have an inbuilt gpg module.

gpg

So in the help, we can see -d for decrypt. so I used -d to solve this.

Yesssssssssss, we got Flag.

Flag: DUCTF{S1GN1NG_A1NT_3NCRYPT10N}

I really enjoyed this CTF.

Feel free to give feedback.

--

--

Raj Upadhyay
Raj Upadhyay

Written by Raj Upadhyay

DFIR Consultant || #LoveToPlayCTF #infosec #cybersecurity #4n6

No responses yet